共 56 条
[1]
Eiza MH(2017)Driving with sharks: rethinking connected vehicles with vehicle cybersecurity IEEE Veh Technol Mag 12 45-51
[2]
Ni Q(2018)Sound-proximity: 2-factor authentication against relay attack on passive keyless entry and start system J Adv Transp 2018 1935974-23
[3]
Choi W(2018)Risks of trusting the physics of sensors Commun ACM 61 20-42
[4]
Seo M(2019)Survey and classification of automotive security attacks Information 10 148-174
[5]
Lee DH(2012)Image encryption using HC-128 and HC-256 stream ciphers Int J Electron Secur Digit Forensics 4 19-54
[6]
Fu K(2001)Privacy and security concerns as major barriers for e-commerce: a survey study Inf Manag Comput Secur 9 165-4756
[7]
Xu W(2011)Substitution-permutation based image cipher using chaotic henon and baker’s maps Int Rev Comput Softw 6 40-276
[8]
Sommer F(2009)Intelligent vehicle power control based on machine learning of optimal control parameters and prediction of road type and traffic congestion IEEE Trans Veh Technol 58 4741-1709
[9]
Dürrwang J(2010)A general active-learning framework for on-road vehicle recognition and tracking IEEE Trans Intell Transp Syst 11 267-2096
[10]
Kriesten R(2015)Remote driver identification using minimal sensory data IEEE Commun Lett 19 1706-140